Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

G2700 Exam Dumps - GIAC Certification Questions and Answers

Question # 34

Which of the following is a formal state transition model of computer security policy that is used to describe a set of access control rules which use security labels on objects and clearances for subjects?

Options:

A.

Five Pillars model

B.

Classic information security model

C.

Bell-LaPadula model

D.

Clark-Wilson integrity model

Buy Now
Question # 35

The disciplined and structured process, that integrates information security and risk management activities into the System Development Life Cycle, is provided by the risk management framework.

Choose the appropriate RMF steps.

Options:

A.

Buy Now
Question # 36

Which of the following are the various types of risk analysis?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Corrective

B.

Quantitative

C.

Repressive

D.

Qualitative

Buy Now
Question # 37

Single Loss Expectancy (SLE) represents an organization's loss from a single threat. Which of the following formulas best describes the Single Loss Expectancy (SLE)?

Options:

A.

SLE = Asset Value (AV) * Exposure Factor (EF)

B.

SLE = Annualized Loss Expectancy (ALE) * Exposure Factor (EF)

C.

SLE = Annualized Loss Expectancy (ALE) * Annualized Rate of Occurrence (ARO)

D.

SLE = Asset Value (AV) * Annualized Rate of Occurrence (ARO)

Buy Now
Question # 38

You work as an Information Security Manager for uCertify Inc. You are implementing an asset management strategy. Which of the following should you include in your strategy to make it effective?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Software assets

B.

Organization's reputation

C.

Outage duration

D.

IT equipment

Buy Now
Question # 39

Which of the following policies is a set of rules applied by the owner/manager of a network, Website or large computer system that restrict the ways in which the network site or system may be used?

Options:

A.

Default policy

B.

Certificate policy

C.

Informative policy

D.

Acceptable use policy

Buy Now
Question # 40

Which of the following paragraphs of the Turnbull Report stated that a company's system of internal control will include information and communication processes?

Options:

A.

Paragraph 28

B.

Paragraph 20

C.

Paragraph 21

D.

Paragraph 22

Buy Now
Question # 41

Which of the following honeypots provides an attacker access to the real operating system without any restriction and collects a vast amount of information about the attacker?

Options:

A.

Medium-interaction honeypot

B.

Honeyd

C.

High-interaction honeypot

D.

Low-interaction honeypot

Buy Now
Question # 42

Which of the following statements is true about exposure factor?

Options:

A.

It is defined as the cost related to a single realized risk against a particular asset.

B.

It is defined as the yearly cost of all instances of a particular threat against a particular ass et.

C.

It is defined as the expected frequency of occurrence of a particular threat or risk in a singl e year.

D.

It is defined as the percentage of loss experienced by an organization when a particular asset is violated by a realized risk.

Buy Now
Question # 43

Mark is the project manager of the NHQ project in StarTech Inc. The project has an asset valued at $195,000 and is subjected to an exposure factor of 35 percent. What will be the Single Loss Expectancy of the project?

Options:

A.

$67,250

B.

$92,600

C.

$72,650

D.

$68,250

Buy Now
Exam Code: G2700
Exam Name: GIAC Certified ISO-2700 Specialist Practice Test
Last Update: Aug 24, 2025
Questions: 453
G2700 pdf

G2700 PDF

$25.5  $84.99
G2700 Engine

G2700 Testing Engine

$28.5  $94.99
G2700 PDF + Engine

G2700 PDF + Testing Engine

$40.5  $134.99